Categories: Computer Security

65% Second-Hand Memory card’s Still have the Previous Owners Personal Data – Reveals by New Research

New research conducted by the University of Hertfordshire revealed that two-thirds of second-hand Memory card’s still contains the personal data from previous owners

Based on the research, people aren’t sufficiently erasing data from their personal data before selling their old memory cards which are used from mobile phones and tablets.

This In-depth research conducted by the University of Hertfordshire which is commissioned by Comparitech.com, security and privacy reviews website on sold and used memory cards.

Research uncovered that sold memory card into secondhand contains personal information and sensitive materials, including passport copies, contact lists and identification numbers being passed from one person to the next.

A team of researchers purchased around 100 used SD and micro SD memory cards from eBay, secondhand shops and other external sources for the previous 4 months.

All the gathered memory cards ware analyzed using freely available software to recover data and also created a forensic image of each memory card copy.

65% Memory card’s Data Recovered

After the complete analysis researchers were able to recover 65 % memory cards data that contains selfies, contact lists, navigation files, pornography, resumes, browsing history and other more confidential data.

University of Hertfordshir, Cyber Security Professor Andrew Jones,said” This research uncovers the prevalence of second-hand memory cards providing a rich source of sensitive data, that could easily be misused if a buyer so wished. Despite the ongoing media focus on cybercrime and the security of personal data, it is clear from our research that the majority are still not taking adequate steps to remove all data from before sales.”

Researchers purchased a different type of storage capacity memory cards and complete analyzed it using various ways using publicly available forensic tools.

According to comparitech memory cards were analyzed and given the following result.

  • 36 were not wiped at all—neither the original owner nor the seller took any steps to remove the data.
  • 29 appeared to have been formatted, but data could still be recovered “with minimal effort.”
  • 25 appeared to have been properly wiped using a data erasing tool that overwrites the storage area, so nothing could be recovered.
  • 4 could not be accessed (read: were broken).
  • 4 had no data present, but the reason could not be determined.
  • 2 cards had their data deleted, but it was easily recoverable.

These all are the sensitive data eventually used by cyber criminals for various malicious purposes so users avoid selling their used memory cards else make sure the memory card has been completely wiped.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

4 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

4 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

7 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

11 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

11 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

12 hours ago